Re: Header V3 RSA/SHA1 Signature, key ID d651ff2e: BAD

2023-02-19 Thread Sérgio Basto via rpmfusion-developers
> > the defaul crypto police (update-crypto-policies --set LEGACY) , I > > wrote in > > https://discussion.fedoraproject.org/t/header-v3-rsa-sha1-signature-key-id-d651ff2e-bad/42350/4 > > one solution . > > > > And I have checked all rpmfusion packages with fc36 have SHA1 when

Re: Header V3 RSA/SHA1 Signature, key ID d651ff2e: BAD

2023-02-19 Thread Gary Buhrmaster via rpmfusion-developers
On Sun, Feb 19, 2023 at 11:05 PM Leigh Scott via rpmfusion-developers wrote: > > I don't think a +2 release upgrade is a valid test case, I believe f37 > is SHA256 signed. > Fedora officially supports a +2 release upgrade, and for reasons[0][1], some people only upgrade to N when N-2 is about to

Re: Header V3 RSA/SHA1 Signature, key ID d651ff2e: BAD

2023-02-19 Thread Leigh Scott via rpmfusion-developers
777 Header V3 RSA/SHA1 Signature, key ID d651ff2e: BAD Header SHA256 digest: OK Header SHA1 digest: OK [2] https://www.scrye.com/wordpress/nirik/2023/01/31/error-rpmdbnextiterator-skipping-in-fedora-38/ https://ask.fedoraproject.org/t/popular-third-party-rpms-fail-to-install-update-remove-due-t

Header V3 RSA/SHA1 Signature, key ID d651ff2e: BAD

2023-02-19 Thread Sérgio Basto via rpmfusion-developers
led in F38 unless we change the defaul crypto police (update-crypto-policies --set LEGACY) , I wrote in https://discussion.fedoraproject.org/t/header-v3-rsa-sha1-signature-key-id-d651ff2e-bad/42350/4 one solution . And I have checked all rpmfusion packages with fc36 have SHA1 when now we need to h